EXPLORE
← Back to Explore
T1497

Virtualization/Sandbox Evasion

Adversaries may employ various means to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of checks for the presence of artifacts indicative of a virtual machine environment (VME) or sandbox. If the adversary detects a VME, they may alter their malware to disengage from the victim or conceal the core functions of the implant. They may also search for VME artifacts before dropping secondary or additional payloads. Adversaries may u...

LinuxmacOSWindows
12
Detections
2
Sources
3
Threat Actors

BY SOURCE

7splunk_escu5elastic

PROCEDURES (10)

General Monitoring2 detections

Auto-extracted: 2 detections for general monitoring

Unusual2 detections

Auto-extracted: 2 detections for unusual

Evasion1 detections

Auto-extracted: 1 detections for evasion

Credential1 detections

Auto-extracted: 1 detections for credential

Credential1 detections

Auto-extracted: 1 detections for credential

Parent Process1 detections

Auto-extracted: 1 detections for parent process

Evasion1 detections

Auto-extracted: 1 detections for evasion

Script Execution Monitoring1 detections

Auto-extracted: 1 detections for script execution monitoring

Bypass1 detections

Auto-extracted: 1 detections for bypass

Command Line Monitoring1 detections

Auto-extracted: 1 detections for command line monitoring

DETECTIONS (12)